Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Social and Behavioral Sciences

Struggle With Covid-19 Crisis Within The Scope Of Financial National Security: The Example Of The Republic Of Turkey, Silacan Karakus Aug 2021

Struggle With Covid-19 Crisis Within The Scope Of Financial National Security: The Example Of The Republic Of Turkey, Silacan Karakus

University of South Florida (USF) M3 Publishing

The COVID-19 pandemic is a discovered infectious disease in the People's Republic of China. This disease was a transformation to pandemic, when to spread all over the world in a short time, within the research framework. The struggle of the COVID-19 in the scope of financial national security was an analytical issue with example of the Republic Turkey for this study. The initiation of the emergence process of the COVID-19 epidemic in China. The third part is an examination of the spread of the COVID-19 epidemic to the whole world. The evaluated struggle of COVID-19 within the scope of financial …


An Economics Primer For Cyber Security Analysts, John T. Harvey Jun 2018

An Economics Primer For Cyber Security Analysts, John T. Harvey

Military Cyber Affairs

One of the ingredients necessary to an understanding of the impact of cyber attacks is a reliable model of the economy. We face great challenges in trying to protect an already potentially unstable system from cyber aggression and operating with a flawed understanding of the determinants of output, employment, asset prices, et cetera, surely condemns us to failure. This is so not only because we need to know where points of leverage might exist for bad actors to disrupt and disable our system, but because policy recommendations may face significant push back from both selected scholars and powerful vested interests. …


Sticking To Their Guns: The Missing Rma For Cybersecurity, Lior Tabansky Jun 2018

Sticking To Their Guns: The Missing Rma For Cybersecurity, Lior Tabansky

Military Cyber Affairs

Why has cybered conflict disrupted the security of the most developed nations? A foreign adversary contemplating an attack on a developed nation's heartland certainly faces multiple state-run military-grade lines of defense on land, sea and air. A foreign adversary launching a direct cyber-attack on a non-military homeland target will meet none. Armed forces do not shield a society from cyber-attacks originated by foreign adversaries, no longer provide a buffer between the enemy and homeland, nor can they identify the attacker after an attack occurred.

Adversaries succeed in waging cybered conflict against the U.S. and its allies. Having repeatedly inflicted economic …


Cyber Futures And The Justice Motive: Avoiding Pyrrhic Victory, Mark Raymond Jun 2018

Cyber Futures And The Justice Motive: Avoiding Pyrrhic Victory, Mark Raymond

Military Cyber Affairs

Evaluating, and choosing between, possible cyber futures requires making collective decisions about values. Tradeoffs exist in the design of any governance arrangement for information and communications technologies (ICTs). At minimum, policymakers will be required to choose between governance arrangements that optimize for speed and scale on the one hand, and those that optimize for diversity and decentralization on the other. As in any other political domain, every eventual outcome will create winners and losers, at least in relative terms. Actors dissatisfied with outcomes may perceive a discrepancy between entitlements and benefits. In some such cases, they will act on this …


Assessing Whether Oil Dependency In Venezuela Contributes To National Instability, Adam Kott Oct 2012

Assessing Whether Oil Dependency In Venezuela Contributes To National Instability, Adam Kott

Journal of Strategic Security

The focus of this article is on what role, if any, oil has on Venezuela's instability. When trying to explain why a resource-rich country experiences slow or negative growth, experts often point to the resource curse. The following pages explore the traditional theory behind the resource curse as well as alternative perspectives to this theory such as ownership structure and the correlation between oil prices and democracy. This article also explores the various forms of instability within Venezuela and their causes. Finally, the article looks at President Hugo Chavez's political and economic policies as well as the stagnation of the …


Ten Years Of Gwot, The Failure Of Democratization And The Fallacy Of “Ungoverned Spaces”, David P. Oakley, Patrick Proctor Apr 2012

Ten Years Of Gwot, The Failure Of Democratization And The Fallacy Of “Ungoverned Spaces”, David P. Oakley, Patrick Proctor

Journal of Strategic Security

October 7, 2011, marked a decade since the United States invaded Afghanistan and initiated the Global War on Terrorism (GWOT). While most ten-year anniversary gifts involve aluminum, tin, or diamonds, the greatest gift U.S. policymakers can present American citizens is a reconsideration of the logic that guides America's counterterrorism strategy. Although the United States has successfully averted large-scale domestic terrorist attacks, its inability to grasp the nature of the enemy has cost it dearly in wasted resources and, more importantly, lost lives. Two of the most consistent and glaring policy flaws revolve around the concepts of filling "ungoverned spaces" and …


Deterring And Dissuading Nuclear Terrorism, John J. Klein Apr 2012

Deterring And Dissuading Nuclear Terrorism, John J. Klein

Journal of Strategic Security

While nuclear deterrence theory may be well-suited to dealing with nuclear-armed states, its suitability for deterring nuclear terrorism has frequently been questioned since 9/11. While terrorist organizations do not necessarily act uniformly or according to the same underlying beliefs, many of the most aggressive organizations are motivated by an ideology that embraces martyrdom and an apocalyptic vision.1 This ideology may be based on religion or a desire to overthrow a government. Consequently, terrorists motivated by ideology who intend to use a stolen or improvised nuclear device against the United States or its interests may not care about the resulting military …


A Systems-Based Approach To Intelligence Reform, Austen Givens Apr 2012

A Systems-Based Approach To Intelligence Reform, Austen Givens

Journal of Strategic Security

The terrorist attacks of September 11, 2001 prompted the most comprehensive changes to the U.S. Intelligence Community (IC) since its creation via the National Security Act of 1947. Recent structural and organizational reforms, such as efforts to enhance information sharing and recruit speakers of hard-target languages, have also triggered new challenges to successful transformation. In light of the systemic problems facing the IC, this paper argues that systems engineering, a discipline increasingly useful in organizational change, offers a more efficient, holistic approach to the intelligence reform process than the status quo. Systems engineering views the IC as an integrated and …


Extraordinary Rendition And U.S. Counterterrorism Policy, Mark J. Murray Sep 2011

Extraordinary Rendition And U.S. Counterterrorism Policy, Mark J. Murray

Journal of Strategic Security

This article examines the United States Government policy of extraordinary rendition as a response to terrorism. The paper provides a working definition of the term, outlines why it has become controversial, and uses case studies to examine success and failures of extraordinary rendition in practice. The paper concludes with lessons learned—more specifically, policy amendments—that are necessary to keep extraordinary rendition as a viable tool for the Obama Administration and mitigate political fallout against the United States from both its allies and enemies. This paper argues that extraordinary rendition provides flexibility to policymakers to detain terrorists in cases where an attack …


"Obama's Wars," Bob Woodward, (New York, Ny: Simon And Schuster, 2010), Richard J. Kilroy Jr. Jul 2011

"Obama's Wars," Bob Woodward, (New York, Ny: Simon And Schuster, 2010), Richard J. Kilroy Jr.

Journal of Strategic Security

No abstract provided.


The Development Of British Defence Policy: Blair, Brown And Beyond. By David Brown, Ed. (Burlington, Vt: Ashgate Publishing Company, 2010), Edward M. Roche Jan 2011

The Development Of British Defence Policy: Blair, Brown And Beyond. By David Brown, Ed. (Burlington, Vt: Ashgate Publishing Company, 2010), Edward M. Roche

Journal of Strategic Security

No abstract provided.


What Price Security?, Donald C. Masters Sep 2009

What Price Security?, Donald C. Masters

Journal of Strategic Security

This article presents a critique of the Copenhagen Consensus Center's(CCC) exhaustive study on transnational terrorism, published in 2008.The implications of this study are controversial, yet highly relevant in today's economic environment. The Obama administration must come toterms with fiscal realities that will challenge budget priorities and invigorate what will undoubtedly prove to be tough negotiations on Capitol Hill for homeland security dollars. It is proposed here that standard economic tools such as benefit cost analysis, cost effectiveness criteria, and simulation models can help identify areas where security can be either extended or improved using fewer resources. Greater movement towards competitive …


Strategic Security As A New Academic Discipline, Sheldon Greaves, Ph.D Nov 2008

Strategic Security As A New Academic Discipline, Sheldon Greaves, Ph.D

Journal of Strategic Security

The creation of Henley-Putnam University was an effort to create an academic institution for the purpose of offering degree programs in intelligence management, counterterrorism, and personal protection; subjects that arguably did not exist as academic disciplines when the school was conceived. The experience of two of the co-founders of the school, Nirmalya Bhowmick and Dr. Michael Corcoran, indicated that the training of officers tasked with vital security and intelligence work was carried out by partnering young officers with a training officer to help the new officer learn on the job. The effectiveness of this training depended to a great extent …


Dividing Up Intelligence Education, Robert Clark, Ph.D Nov 2008

Dividing Up Intelligence Education, Robert Clark, Ph.D

Journal of Strategic Security

At this year's annual conference of the International Association for Intelligence Education (IAFIE) in Monterey, CA, the keynote speaker posed the question, "How much do you need intelligence education outside the beltway?" Which led to a second question discussed during the conference: "What should such education look like?" In short, what should we be teaching in universities? What should we leave to the intelligence community as training? And what could be done in either or both settings? The first question of any educational effort is:What are we preparing students for?